Warning: mysqli::__construct(): (HY000/1203): User howardkn already has more than 'max_user_connections' active connections in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\includes\artfuncs.php on line 21
Failed to connect to MySQL: (1203) User howardkn already has more than 'max_user_connections' active connections
Warning: mysqli::query(): Couldn't fetch mysqli in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\index.php on line 66
Article <uvp5l9$1ojua$1@dont-email.me>
Deutsch   English   Français   Italiano  
<uvp5l9$1ojua$1@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Don Y <blockedofcourse@foo.invalid>
Newsgroups: sci.electronics.design
Subject: Re: Re:Predictive failures
Date: Wed, 17 Apr 2024 11:50:07 -0700
Organization: A noiseless patient Spider
Lines: 201
Message-ID: <uvp5l9$1ojua$1@dont-email.me>
References: <uvjn74$d54b$1@dont-email.me> <uvjobr$dfi2$1@dont-email.me>
 <uvkn71$ngqi$2@dont-email.me>
 <uvkrig$30nb$1@nnrp.usenet.blueworldhosting.com>
 <uvl2gr$phap$2@dont-email.me> <uvm7f5$pvu$1@nnrp.usenet.blueworldhosting.com>
 <uvmaet$1231i$2@dont-email.me>
 <uvmca4$up7$1@nnrp.usenet.blueworldhosting.com>
 <uvmjmt$140d2$1@dont-email.me>
 <uvmkco$2fih$1@nnrp.usenet.blueworldhosting.com>
 <uvmqve$15hl7$2@dont-email.me>
 <uvmthn$bjm$1@nnrp.usenet.blueworldhosting.com>
 <uvn7lm$17so6$2@dont-email.me>
 <uvn96o$2o0t$1@nnrp.usenet.blueworldhosting.com>
 <uvnf00$1cu2a$1@dont-email.me>
 <uvnio7$eac$1@nnrp.usenet.blueworldhosting.com>
 <uvnlr6$1e3fi$1@dont-email.me>
 <uvnnbd$30q6$1@nnrp.usenet.blueworldhosting.com>
 <uvnqg7$1f0pl$1@dont-email.me>
 <uvp23k$1png$1@nnrp.usenet.blueworldhosting.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 17 Apr 2024 20:50:19 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="2b43e3ad6cfda17a11cedcbd329c2ac9";
	logging-data="1855434"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX1/RRTP/9BfvEvD8Enpip0aA"
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:102.0) Gecko/20100101
 Thunderbird/102.2.2
Cancel-Lock: sha1:7ozWDxqUT06vIJvO0QQ5sLe/pps=
Content-Language: en-US
In-Reply-To: <uvp23k$1png$1@nnrp.usenet.blueworldhosting.com>
Bytes: 12052

On 4/17/2024 10:49 AM, Edward Rawde wrote:
>>> You could ping me if you knew my IP address.
>>
>> You can't see me, at all.  You have to know the right sequence of packets
>> (connection attempts) to throw at me before I will "wake up" and respond
>> to the *final*/correct one.  And, while doing so, will continue to
>> ignore *other* attempts to contact me.  So, even if you could see that
>> I had started to respond, you couldn't "get my attention".
> 
> I've never bothered with port knocking.
> Those of us with inbound connectable web servers, database servers, email
> servers etc have to be connectable by more conventional means.

As with installing updates and other "maintenance issues", I have
no desire to add to my workload.  I want to spend my time *designing*
things.

I run the server to save me time handling requests from colleagues for
source code releases.  This lets them access the repository and
pull whatever versions they want without me having to get them and
send them.  Otherwise, they gripe about my weird working hours, etc.
(and I gripe about their poorly timed requests for STATIC resources)

There is some overhead to their initial connection to the server
as the script has to take into account that packets aren't delivered
instantly and retransmissions can cause a connection attempt to be
delayed -- so, *I* might not see it when they think I am.

But, once the connection is allowed, there is no additional
overhead or special protocols required.

>>>>> I wouldn't bother. I'd just not connect it to wifi or wired if I
>>>>> thought
>>>>> there was a risk.
>>>
>>> What I mean by that is I'd clean it without it being connected.
>>> The Avira boot CD used to be useful but I forget how many years ago.
>>
>> If you were to unplug any of the above mentioned ("house") drops,
>> you'd find nothing at the other end.  Each physical link is an
>> encrypted tunnel that similarly "hides" until (and unless) properly
>> tickled.  As a result, eavesdropping on the connection doesn't
>> "give" you anything (because it's immune from replay attacks and
>> it's content is opaque to you)
> 
> I'm surprised you get anything done with all the tickle processes you must
> need before anything works.

I wouldn't "unplug any of the above mentioned drops".  I'd let them connect
using their native protocols.  This is already baked into the code so "costs"
nothing.

The hiding prevents an adversary from cutting an exposed (e.g., outside the
house) cable and trying to interfere with the system.  Just like an adversary
on a factory floor could find a convenient, out-of-the-way place to access the
fabric with malevolent intent.  Or, a guest in a hotel.  Or, a passenger
on an aircraft/ship.  Or, a CAN node in an automobile (!).

>> They should be secure from the threats they are LIKELY TO FACE.
>> If the only access to my devices is by gaining physical entry
>> to the premises, then why waste CPU cycles and man-hours protecting
>> against a threat that can't manifest?  Each box has a password...
>> pasted on the outer skin of the box (for any intruder to read).
> 
> Sounds like you are the the only user of your devices.

I'm a "development lab".  I want to spend my time using my tools to
create new products.  I don't want to bear the overhead of trying to
keep up with patches for 0-day exploits just to be able to USE those
tools.  I am more than willing to trade the hassle of walking
down the hall to another computer (this one) to access my email.
And, if I DL a research paper, copying it onto a thumb drive to
SneakerNet it back to my office.  To me, that's a HUGE productivity
increase!

> Consider a small business.
> Here you want a minimum of either two LANs or VLANs so that guest access to
> wireless can't connect to your own LAN devices.
> Your own LAN should have devices which are patched and have proper
> identification so that even if you do get a compromised device on your own
> LAN it's not likely to spread to other devices.

The house network effectively implements a VLAN per drop.  My OS only lets
"things" talk to other things that they've been preconfigured to talk to.
So, I can configure the drop in the guest bedroom to access the ISP.
Or, one of the radios in the ceiling to do similarly.  If I later decide that
I want to plug a TV into that guest bedroom drop, then the ISP access is
"unwired" from that drop and access to the media server wired in its place.

And, KNOW that there is no way that any of the traffic on either of those
tunnels can *see* (or access) any of the other traffic flowing through the
switch.  The switch is the source of all physical security as you have
to be able to convince it to allow your traffic to go *anywhere* (and WHERE).

[So, the switch is in a protected location AND has the hardware
mechanisms that let me add new devices to the fabric -- by installing
site-specific "secrets" over a secure connection]

Because a factory floor would need the ability to "dial out" from a
drop ON the floor (or WiFi) without risking compromise to any of
the machines that are concurrently using that same fabric.

Imagine having a firewall ENCASING that connection so it can't see *anything*
besides the ISP.  (and, imagine that firewall not needing any particular rules
governing the traffic that it allows as it's an encrypted tunnel letting
NOTHING through)

> You might also want a firewall which is monitored remotely by somone who
> knows how to spot anything unusual.
> I have much written in python which tells me whether I want a closer look at
> the firewall log or not.

Yet another activity I don't have to worry about.  Sit in the guest bedroom
and you're effectively directly connected to The Internet.  If your machine
is vulnerable (because of measures YOU failed to take), then YOUR machine
is at risk.  Not any of the other devices sharing that fabric.  You can get
infected while sitting there and I'm still safe.

My "labor costs" are fixed and don't increase, regardless of the number
of devices and threats that I may encounter.  No need for IT staff to handle
the "exposed" guests -- that's THEIR problem.

>> Do I *care* about the latest MS release?  (ANS:  No)
>> Do I care about the security patches for it?  (No)
>> Can I still do MY work with MY tools?  (Yes)
> 
> But only for your situation.
> If I advised a small business to run like that they'd get someone else to do
> it.

And they would forever be "TAXED" for their choice.  Folks are starting
to notice that updates often don't give them anything that is worth the
risk/cost of the update.  Especially if that requires/entices them to have
that host routed!

My colleagues have begrudgingly adopted a similar "unrouted development
network" for their shops.  The savings in IT-related activities are
enormous.  And, they sleep more soundly knowing the only threats
they have to worry about are physical break-in and equipment
failure.

You want to check your email?  Take your phone out of your pocket...
Need to do some on-line work (e.g., chasing down research papers
or browsing a remote repository)?  Then move to an "exposed"
workstation FOR THAT TASK.

[Imagine if businesses required their employees to move to such
a workstation to browse YouTube videos or check their facebook
page!  "Gee, you're spending an awful lot of time 'on-line',
today, Bob...  Have you finished that DESIGN, yet?"]

>> I have to activate an iPhone, tonight.  So, drag out a laptop
>> (I have 7 of them), install the latest iTunes.  Do the required
>> song and dance to get the phone running.  Wipe the laptop's
>> disk and reinstall the image that was present, there, minutes
>> earlier (so, I don't care WHICH laptop I use!)
> 
> You'll have to excuse me for laughing at that.
> Cybersecurity is certainly a very interesting subject, and thanks for the
> discussion.
> If I open one of the wordy cybersecurity books I have (pdf) at a random page
========== REMAINDER OF ARTICLE TRUNCATED ==========